نتایج جستجو برای: bob marley

تعداد نتایج: 4072  

Journal: :Journal of Scientific Exploration 2018

Journal: :Journal of Scientific Exploration 2018

2016
Kamal Khuri-Makdisi

Then two people, traditionally called Alice and Bob, can communicate in privacy even if their messages are being intercepted (e.g., over the internet!). To send a message m ∈ MP , Alice sends m′ = E(m) ∈ MC, and Bob decodes m′ by applying D to it. This assumes that Alice and Bob have decided on D and E, which they usually keep private between themselves. The cryptographer (Cathy) only sees the ...

Journal: :CoRR 2011
Michael T. Goodrich Michael Mitzenmacher Olga Ohrimenko Roberto Tamassia

We study oblivious storage (OS), a natural way to model privacy-preserving data outsourcing where a client, Alice, stores sensitive data at an honest-but-curious server, Bob. We show that Alice can hide both the content of her data and the pattern in which she accesses her data, with high probability, using a method that achieves O(1) amortized rounds of communication between her and Bob for ea...

Journal: :Physical review letters 2018
Emily Adlam Adrian Kent

Bob has a black box that emits a single pure state qudit which is, from his perspective, uniformly distributed. Alice wishes to give Bob evidence that she has knowledge about the emitted state while giving him little or no information about it. We show that zero-knowledge evidencing of such knowledge is impossible in quantum relativistic protocols, extending a previous result of Horodecki, Horo...

Journal: :American journal of clinical pathology 2006
Sarah E Gibson Henry Y Dong Anjali S Advani Eric D Hsi

The aberrant expression of the B-cell transcription factor PAX5 has been described in a subset of acute myeloid leukemia (AML) with t(8;21)(q22;q22) in association with B-cell antigen expression. However, the expression of other B cell-associated transcription factors, particularly OCT-2 and its B cell-specific coactivator BOB.1, has not been described in AML. In this study, expression of PAX5,...

2003
Qing-yu Cai

A direct secure communication using step-split Einstein-Podolsky-Rosen (EPR) pair is presented. Alice will sends one qubit of the EPR pair to Bob first. Then Bob sends a receipt signal to Alice through public channel. Alice performs her encoding operations on the second qubit and sends the qubit to Bob. Bob performs a Bell type measurement to fraw Alice’s information. If Eve want to eavesdrop A...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید